StealthWatch gets enhanced threat detection
Posted on 10 July 2013.
Lancope released the latest version of its StealthWatch flow-based monitoring system to enable faster, more effective threat detection and incident response. With StealthWatch 6.4, customers can obtain insight into network and user activity to improve operations and fend off attacks.

“The online threats facing governments and enterprises continue to grow – with DDoS, APTs, advanced malware and insider threats all wreaking havoc on corporate networks,” said Mike Potts, president and CEO of Lancope. “With StealthWatch 6.4, we have added several powerful capabilities that provide organisations with enhanced visibility and control over their networks. In particular, our new user-centric monitoring functionality is invaluable for combating insider threats, as well as for improving incident response, forensics and compliance.”

StealthWatch boasts user-centric monitoring workflows that enable security teams to run flow queries and reports based on actual user names versus just IP addresses.

Administrators can search on user names, as well as obtain a report outlining a specific person’s network activity – including any anomalous behavior or alarms triggered.

StealthWatch 6.4 extends Lancope’s detection capabilities for DDoS attacks into the application layer with the ability to identify and alarm on slow connection floods for HTTP and HTTPS.

StealthWatch also enables organizations to detect the source of volumetric DDoS attacks by alarming on unusually large traffic volumes, providing a multi-pronged approach to thwarting these rising attacks.

As Lancope deepens its relationship with Cisco, it is reflected in StealthWatch 6.4 through tighter and more flexible integration with Cisco’s Identity Services Engine (ISE), ASR/ISR and ASA platforms. Lancope now also consumes user names directly from Cisco ASA NetFlow records, further increasing its identity awareness capabilities.

As a key component of the Cisco Cyber Threat Defense Solution and a Registered Developer in the Cisco Developer Network, Lancope also integrates with many other Cisco appliances including the NGA.





Spotlight

Windows 0-day exploited in ongoing attacks, temporary workarounds offered

Posted on 22 October 2014.  |  A new Windows zero-day vulnerability is being actively exploited in the wild and is primarily a risk to users on servers and workstations that open documents with embedded OLE objects.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Thu, Oct 23rd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //